Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipher key setting system, access point, and cipher key setting method

a technology of access points and cipher keys, applied in wireless communication, digital transmission, transportation and packaging, etc., can solve the problems that the security environment cannot be optimized between wireless lan devices participating in the network, and achieve the effect of relieve the troublesomeness of performing notifications, and prevent the effect of lowering security

Inactive Publication Date: 2005-10-27
BUFFALO CORP LTD
View PDF9 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0016] According to a third aspect of the invention, the connected terminal detecting means specifies the terminals participating in the wireless LAN repeatedly at each predetermined time on the basis of identification information inherent in the terminals each, compares the specified identification information inherent in the terminals each with the identification information inherent in the terminals each that were acquired by a previous specifying operation of the terminals, and thereby detects that the number of the terminals participating in the wireless LAN decreases.
[0032] In the ninth aspect of the invention constructed as the above, when it becomes impossible to maintain the wireless communication with the access point based on the specified station ID, the cipher system selecting means on the terminal side newly acquires the station IDs from the connectable access points. And when the newly acquired station IDs have a station ID coincident with the station IDs stored in advance, the terminal adopts the cipher system and the cipher key corresponding to the station ID. In other words, when there have been variations in the adopted cipher systems due to a decrease of the number of the terminals participating in the wireless LAN or due to replacements of the terminals, the access point does not need to notify the newly adopted cipher systems and so forth to the terminals that intend to maintain the wireless communications. It is possible to automatically follow up the variations in the cipher systems on the terminal side, which will relieve troublesomeness of the maintenance and prevent lowering of the security.

Problems solved by technology

However, the invention described in the application leaves technical problems as follows.
In consequence, after a terminal withdraws from the network, there remains a problem that the security environments cannot necessarily be optimized between wireless LAN devices participating in the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key setting system, access point, and cipher key setting method
  • Cipher key setting system, access point, and cipher key setting method
  • Cipher key setting system, access point, and cipher key setting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The preferred embodiments of the invention will be described in the following order. [0051] 1. Schematic construction for implementing the cipher key setting system [0052] 2. Concrete contents of the cipher key setting system

[0053] 2-1. case of increasing the terminal number

[0054] 2-2 case of decreasing the terminal number [0055] 3. Modified examples [0056] 4. Conclusion

1. Schematic Construction for Implementing the Cipher Key Setting System

[0057]FIG. 1 illustrates a construction of hardware that implements the cipher key setting system relating to the invention. FIG. 2 illustrates a construction of an access point 20.

[0058] The cipher key setting system performs a wireless communication between a specified terminal and the access point 20 in a wireless LAN communication area AR1, in which the cipher key data representing the contents of the cipher key are superposed on a radio wave; and thereby, the system sets the cipher key used in the wireless communication between ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a cipher key setting system wherein the access point detects the terminals connected to the wireless LAN through the access point itself repeatedly at each predetermined time, reviews the adopted cipher systems when there are replacements of the terminals participating in the wireless LAN and a decrease in the number of the terminals, and adopts a cipher system according to the guideline ‘selecting the cipher system of the highest security level among the cipher systems that the devices building up the network can commonly adopt’. The system prevents the security setting from being maintained at a needlessly low level, after a certain terminal withdrew from the network or after some terminals were replaced.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates to a cipher key setting system, an access point, and a cipher key setting method. [0003] 2. Description of the Related Art [0004] To build up a communication network with an access point being a repeater for a wireless LAN needs to attain a high security level of the network, which prevents fraudulent intrusion into the network and the leakage of communication data to a third party and so forth. Accordingly, various security techniques on the wireless LAN have been disclosed thus far. [0005] For example, a technique is proposed which utilizes MAC (Media Access Control) addresses being inherent identification numbers assigned in advance to wireless LAN interfacing devices (for example, wireless LAN adapters) mounted on terminals. This technique registers the MAC addresses to an access point, makes the access point authenticate the MAC addresses accompanied with the accesses from the term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08H04K1/00H04L12/28H04L29/06H04W12/02H04W12/04H04W24/00H04W84/12
CPCH04L63/062H04L63/105H04L63/205H04W84/12H04W88/08H04W12/02H04W12/67B65B35/56B65B5/10B65B35/30B65G47/26B65G2201/0238
Inventor TAMURA, YOSHITERU
Owner BUFFALO CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products